...RISK MANAGEMENT GUIDE FOR DOD ACQUISITION Sixth Edition (Version 1.0) [pic] AUGUST, 2006 Department of Defense Preface The Department of Defense (DoD) recognizes that risk management is critical to acquisition program success (see the Defense Acquisition Guidebook (DAG), Section 11.4). The purpose of addressing risk on programs is to help ensure program cost, schedule, and performance objectives are achieved at every stage in the life cycle and to communicate to all stakeholders the process for uncovering, determining the scope of, and managing program uncertainties. Since risk can be associated with all aspects of a program, it is important to recognize that risk identification is part of the job of everyone and not just the program manager or systems engineer. That includes the test manager, financial manager, contracting officer, logistician, and every other team member. The purpose of this guide is to assist DoD and contractor Program Managers (PMs), program offices and Integrated Product Teams (IPTs) in effectively managing program risks during the entire acquisition process, including sustainment. This guide contains baseline information and explanations for a well-structured risk management program. The management concepts and ideas presented here encourage the use of risk-based management practices and suggest a process to address program risks without prescribing specific methods or tools....
Words: 12584 - Pages: 51
...OVERVIEW UNITED STATES DEPARTMENT OF DEFENSE FISCAL YEAR 2014 BUDGET REQUEST APRIL 2013 OFFICE OF THE UNDER SECRETARY OF DEFENSE (COMPTROLLER) / CHIEF FINANCIAL OFFICER Preface The Overview Book has been published as part of the President’s Annual Defense Budget for the past few years. This continues for FY 2014, but with modifications as proposed by congressional staff. From FY 1969 to FY 2005 OSD published the “Annual Defense Report” (ADR) to meet 10 USC Section 113 requirements. Starting with the President’s FY 2006 Budget, this report was no longer produced. Subsequently, the Overview began to fill this role. This year to ensure compliance with Section 113, new chapters are added to include reports from each Military Department on their respective funding, military mission accomplishments, core functions, and force structure. Key initiatives incorporated in the FY 2014 Defense budget. Our budget is formulated based on aligning program priorities and resources based on the President’s strategic guidance. This year’s budget involves key themes to: achieve a deeper program alignment of our future force structure with resource availability; maintain a mission ready force; continue to emphasize efficiencies by being even better stewards of taxpayer dollars; and continue to take care of our people and their families. Implementing Defense Strategic Guidance. The FY 2014 budget request continues the force structure reductions made in the FY 2013 budget request. Following...
Words: 74297 - Pages: 298
...Emerging Cybersecurity Policies in the Federal Government Information Assurance Officer and Risk Management Analyst Department of Defense. Emerging Cybersecurity Policies in the Federal Government Information Assurance Officer and Risk Management Analyst Department of Defense. CSEC 655 UMUC Individual Assignment 1 September 16, 2014 CSEC 655 UMUC Individual Assignment 1 September 16, 2014 Table of Contents Emerging Cybersecurity Policies in the Federal Government 3 Emerging Policies and Practices 4 Defense in Depth (DID) 5 Security Risk Frameworks 6 Test Driven Development 8 Business Service Frameworks 9 Acceptance and Preparation for Failure 11 The Federal Government and these Emerging Policies and Practices 13 The Feds and Defense in Depth 14 The Feds and Security Risk Frameworks 14 The Feds and Test Driven Development 16 The Feds and Business Service Frameworks 17 The Feds and Acceptance and Preparation for Failure 19 How could the Feds continue to improve 20 References 22 Emerging Cybersecurity Policies in the Federal Government One of the largest and most important enterprises there is to protect in the cyber security realm are the various networks that make up the federal government. This massive undertaking to secure the systems, networks, and data of the various governmental agencies is a never ending uphill battle. The requirements of the federal government enterprise to be globally far reaching, as well...
Words: 6354 - Pages: 26
...Army Regulation 350–1 Training Army Training and Leader Development Rapid Action Revision (RAR) Issue Date: 4 August 2011 Headquarters Department of the Army Washington, DC 18 December 2009 UNCLASSIFIED SUMMARY of CHANGE AR 350–1 Army Training and Leader Development This rapid action revision, 4 September 2011-o Implements the Don’t Ask, Don’t Tell Repeal Act of 2010 by deleting all references to developing and conducting training concerning the Army’s Homosexual Conduct Policy (paras 2-21p and 2-22k.) o Rescinds paragraphs 2-6r, 2-46ac, and G-14e.) o Makes administrative changes (app A: marked obsolete forms and publications; corrected forms and publication titles; and corrected Web site addresses; glossary: deleted unused acronyms and corrected titles/abbreviations as prescribed by Army Records Management and Declassification Agency). *Army Regulation 350–1 Headquarters Department of the Army Washington, DC 18 December 2009 Effective 18 January 2010 Training Army Training and Leader Development History. This publication is a rapid action revision (RAR). This RAR is effective 20 September 2011. The portions affected by this RAR are listed in the summary of change. Summary. This regulation consolidates policy and guidance for Army training and leader development and supports a full-spectrum, force protection, expeditionary Army. Applicability. This regulation applies to the active Army, the Army National ...
Words: 129456 - Pages: 518
...[pic] Student Guide for Performance Based Service Acquisition And The Seven Step Process (ACQ 265) Nov 2009 Table of Contents UNIT 1 Introduction UNIT 2 Form the Team, Review Current Strategy, Market Research Step 1: Form the Team Step 2: Review the Current Strategy Step 3: Market Research UNIT 3 An Industry Perspective: Approaching an Acquisition UNIT 4 Requirements Definition Step 4: Requirements Definition UNIT 5 Develop your Sourcing Strategy Step 5: Sourcing Strategy UNIT 6 Execute the Strategy Step 6: Execute the Strategy UNIT 7 Performance Management Step 7: Manage Performance Appendices I Acronym List II Glossary | | | |Course Title |Performance Based Service Acquisition (ACQ 265) | | | | | | | |Lesson Title | Course Introduction | | ...
Words: 44891 - Pages: 180
...GUIDEBOOK FOR FACILITATING SMALL BUSINESS TEAM ARRANGEMENTS SEPTEM BER 2007 DEPARTMENT OF DEFENSE OFFICE OF SMALL BUSINESS PROGRAMS Contents Preface .......................................................................................................... v Chapter 1 Introduction................................................................................... 1 GROWTH OF TEAMING .................................................................................................. 1 GROWTH OF CONTRACT CONSOLIDATION ....................................................................... 1 PURPOSE .................................................................................................................... 2 STRUCTURE OF THIS GUIDEBOOK .................................................................................. 2 Chapter 2 Challenges of Consolidation and Bundling to Small Business............................................................................................... 4 CONSOLIDATION ........................................................................................................... 4 BUNDLING .................................................................................................................... 5 Diversity, Size, and Specialized Nature of the Requirement................................. 6 Aggregate Dollar Value ........................................................................................ 6 Geographical Dispersion of the...
Words: 29004 - Pages: 117
...AFGE 2013 Issue Papers Table of Contents Another Manufactured Crisis: What’s Next in the Fiscal Showdown………1 Federal Pay……………………………………………………………….…..…..4 Federal Employees’ Health Benefits Program……………………………….15 Official Time for Federal Employee Union Representatives………….........22 Arbitrary Cuts in Civil Servants………………………………………………..26 Sourcing: Complying with the Law……………………………………….......31 Capping Taxpayer-Funded Service Contractor Compensation……………43 Transportation Security Administration and TSOs…………………………..46 Domestic Partnership Benefits……………………………..………………….49 Employment Non-Discrimination Act……………………………………..…..55 Paid Parental Leave………………………………………………..…………..57 One America, Many Voices Act………………………………………….…....60 Department of Veterans Affairs…………………………………..……………62 Department of Defense……………………………...……….………………...71 Federal Prisons………………………………………………………………….90 Social Security Administration ……………………………………….…...…103 National Guard/Reserve Technicians ………………………...……….……108 D.C. Workers’ Issues …………………...……………………………..…..…117 Equal Employment Opportunity Commission. ……………………..……...120 Another Manufactured Crisis: What’s Next in the Fiscal Showdown? Background At the beginning of January, President Obama signed a tax deal that restored higher Clinton-era rates to those making over $450,000, and funded an extension of unemployment insurance benefits to the long-term unemployed, extended for another year the $240 monthly transit subsidy, but did not...
Words: 54164 - Pages: 217
...ACCESS CONTROL IN SUPPORT OF INFORMATION SYSTEMS SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 2, Release 2 26 DECEMBER 2008 Developed by DISA for the DoD UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD This page is intentionally blank. ii UNCLASSIFIED Access Control in Support of Information Systems STIG, V2R2 26 December 2008 DISA Field Security Operations Developed by DISA for the DoD TABLE OF CONTENTS Page SUMMARY OF CHANGES...................................................................................................... IX 1. INTRODUCTION................................................................................................................. 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 2. Background ..................................................................................................................... 1 Authority ......................................................................................................................... 2 Scope............................................................................................................................... 3 Writing Conventions....................................................................................................... 3 Vulnerability Severity Code Definitions ........................................................................ 4 STIG Distribution .......
Words: 38488 - Pages: 154
...LIFE CYCLE PROCESSES AND ACTIVITIES INCOSE-TP-2003-002-03 June 2006 INCOSE Systems Engineering Handbook v. 3 SYSTEMS ENGINEERING HANDBOOK A GUIDE FOR SYSTEM LIFE CYCLE PROCESSES AND ACTIVITIES INCOSE-TP-2003-002-03 INCOSE SYSTEMS ENGINEERING HANDBOOK, version 3 June 2006 Edited by: Cecilia Haskins Copyright © 2006 International Council on Systems Engineering, subject to restrictions listed on the inside cover. INCOSE-TP-2003-002-03 June 2006 INCOSE Systems Engineering Handbook v. 3 This INCOSE Technical Product was prepared by the Systems Engineering Handbook Development Team of the International Council on Systems Engineering (INCOSE). It is approved by INCOSE for release as an INCOSE Technical Product. Copyright © 2006 by INCOSE, subject to the following restrictions: Author use: Authors have full rights to use their contributions in a totally unfettered way with credit to this INCOSE Technical Product. Abstraction is permitted with credit to the source. INCOSE use: Permission to reproduce this document and use this document or parts thereof by members of INCOSE and to prepare derivative works from this document for INCOSE use is granted, with attribution to INCOSE and the original author(s) where practical, provided this copyright notice is included with all reproductions and derivative works. Content from ISO/IEC 15288:2002(E) are used by permission, and are not to be reproduced other than as part of this total document. External use: This...
Words: 63595 - Pages: 255
...Boeing Company 2010 Annual Report At Boeing, we aspire to be the strongest, best and best-integrated aerospace-based company in the world — for today and tomorrow. The Boeing Company Boeing is the world’s largest aerospace company and leading manufacturer of commercial airplanes and defense, space and security systems. A top U.S. exporter, the company supports airlines and U.S. and allied government customers in more than 90 countries. Our products and tailored services include commercial and military aircraft, satellites, weapons, electronic and defense systems, launch systems, advanced information and communication systems, and performance-based logistics and training. With corporate offices in Chicago, Boeing employs more than 160,000 people across the United States and in 70 countries. Our leadership is strengthened further by hundreds of thousands of people who work for Boeing suppliers worldwide. Contents Operational Summary Message From Our Chairman The Executive Council Financial Results Form 10-K Selected Programs, Products and Services Shareholder Information Board of Directors Company Officers 1 2 7 8 9 134 141 142 142 Cover photo: 787 Dreamliner in flight test Photo above: F/A-18E/F Super Hornet strength Operational Summary Q Earned net income of $3.3 billion, or $4.46 per share, compared with $1.3 billion, or $1.87 per share, in 2009. Q Delivered 115 production military aircraft, two launch vehicles and four satellites, and increased backlog at...
Words: 72708 - Pages: 291
...“MARKET SURVEY OF RIGHT EXECUTION FOR COCA COLA“ PROJECT REPORT 2009 Submitted for the partial fulfillment of the requirement for the award Of MASTER OF BUSINESS ADMINISTRATION SUBMITTED BY NITIN TYAGI 0823170410 UNDER THE SUPERVISION OF External: Mr. Alok Agarawal (Area Sales Manager) Internal: Mr. Neeraj Kumar (Lecturer) Department of Management R.D.ENGINEERING COLLEGE, DUHAI, GHAZIABAD 1 DECLARATION I here by declare that this project report prepared in lieu of a compulsory paper for the partial fulfillment of Management of Business Administration (HR and Marketing) is my original work which I have submitted in Coca Cola to my guide Mr. Neeraj Kumar. No part of it has been submitted to any other university or organization. All the information and data in my project are authentic to the best of my knowledge and taken from reliable sources. Nitin Tyagi 2 ACKNOWLEDGEMENT Survey is the team project, while my name is on the cover page of this project, literally many of people have contributed to this summer training Project report. Every work requires a commitment but this commitment goes in rain when there is no guidance. I am extremely thankful to Mr. SAMEER MANDAL (Sr. Sales Executive) under whose able guidance I have worked on this survey & for his willing and every available cooperation through out the project. Last but not the least; I acknowledge with thanks the valuable suggestions of Mr. Sandeep Yadav & all my friends and all of my wishers...
Words: 15642 - Pages: 63
...Gartner Research named cloud computing as one of the top technologies to watch in 2010, 2011, and 2012. At its core, cloud computing is a technical architecture that meets a specific business need. This chapter traces the roots of cloud computing from its origins in mainframe distributed computing, discusses the basics of the cloud computing model today, and offers insights for future directions that are likely to be pursued in the cloud computing arena. A number of challenges to cloud computing are identified, including concerns of security and how to deal with the rise of mobile computing. The chapter ends with recommendations on how to choose which cloud model is most appropriate to meet your organization’s needs and how to establish a successful cloud strategy. INTRODUCTION: DEFINING THE CLOUD I shall not today attempt further to define the kinds of material I understand to be embraced within that shorthand description; and perhaps I could never succeed in intelligibly doing so. But I know it when I see it. ~ Hon. Potter Stewart (U.S. Supreme Court Justice) Why did Gartner Research place cloud computing at the top of the list of most important technology focus areas for the past three years straight (Avram, 2011; Gartner, 2010; McDonald, 2010)? In today’s world of tight budgets and even tighter profit margins, speed to capability is paramount; cloud computing has proven effective in enterprise class business environments (Zhang, Zhang, Chen, & Huo, 2010). As Golden (2010)...
Words: 13736 - Pages: 55
...States Code, Section 105, it may not be copyrighted. Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. ***** The views expressed in this report are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the U.S. Government. This report is cleared for public release; distribution is unlimited. ***** Comments pertaining to this report are invited and should be forwarded to: Director, Strategic Studies Institute, U.S. Army War College, 122 Forbes Ave, Carlisle, PA 17013-5244. ***** All Strategic Studies Institute (SSI) monographs are available on the SSI homepage for electronic dissemination. Hard copies of this report also may be ordered from our homepage. SSI’s homepage address is: www.StrategicStudies Institute.army.mil. ***** The Strategic Studies Institute publishes a monthly e-mail newsletter to update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming conferences sponsored by the Institute. Each newsletter also provides a strategic commentary by one of our research analysts. If you are interested in receiving this newsletter, please subscribe on our homepage at www.StrategicStudiesInstitute.army.mil/newsletter/. ISBN 1-58487-233-0 ii CONTENTS Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Words: 27758 - Pages: 112
...Approaches to Process Performance Modeling: A Summary from the SEI Series of Workshops on CMMI High Maturity Measurement and Analysis Robert W. Stoddard II Dennis R. Goldenson January 2010 TECHNICAL REPORT CMU/SEI-2009-TR-021 ESC-TR-2009-021 Software Engineering Measurement and Analysis Unlimited distribution subject to the copyright. http://www.sei.cmu.edu This report was prepared for the SEI Administrative Agent ESC/XPK 5 Eglin Street Hanscom AFB, MA 01731-2100 The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange. This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense. Copyright 2010 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this report is not intended in any way to infringe on...
Words: 27376 - Pages: 110
...Leadership Development Seminars and ECQ-based Readings The success or failure of any endeavor depends on leadership. Now, more than ever before, we need leaders in our organizations and in our world. Great leaders create and communicate a vision and move people into action to achieve it. They ignite our passion and inspire us to do our best. Government leaders in the 21st century are experiencing change at a more rapid pace than previous generations. Rapid advances in technology have expanded the quantity of work we are capable of accomplishing, and also where it’s accomplished. We have a more highly educated workforce, yet face diminishing resources with an increased demand for productivity, and the essential services we provide to the American public. To be successful at navigating these challenges leaders must develop the essential skills to motivate their employees, effectively communicate with others, fine-tune critical thinking skills, and build and leverage partnerships. Future leaders must also be visionary; i.e., possess the ability to identify trends and the courage to be innovative. Being technically adept in your field will no longer be enough. In response to these demands on senior executives, the U.S. Office of Personnel Management identified five Executive Core Qualifications (ECQs) that all aspiring government leaders and executives must possess. These ECQs and Fundamental Competencies were developed by OPM after extensive research on the attributes...
Words: 181771 - Pages: 728